ASFF 中的 AwsEventBridge 资源 - AWS Security Hub

ASFF 中的 AwsEventBridge 资源

以下是 AwsEventBridge 资源的 AWS 安全调查发现格式(ASFF)的示例。

AWS Security Hub CSPM 会将各种来源的调查发现标准化为 ASFF。有关 ASFF 的背景信息,请参阅 AWS安全调查发现格式 (ASFF)

AwsEventSchemasRegistry

AwsEventSchemasRegistry 对象提供有关 Amazon EventBridge 架构注册表的信息。架构定义发送到 EventBridge 的事件的结构。架构注册表是收集架构并对其进行逻辑分组的容器。

以下示例显示了 AwsEventSchemasRegistry 对象的 AWS 安全调查发现格式 (ASFF)。要查看 AwsEventSchemasRegistry 属性的描述,请参阅 AWS Security Hub CSPM API 参考中的 AwsEventSchemasRegistry

示例

"AwsEventSchemasRegistry": { "Description": "This is an example event schema registry.", "RegistryArn": "arn:aws:schemas:us-east-1:123456789012:registry/schema-registry", "RegistryName": "schema-registry" }

AwsEventsEndpoint

AwsEventsEndpoint 对象提供有关 Amazon EventBridge 全局端点的信息。端点可以通过使其具有区域容错能力来提高应用程序的可用性。

以下示例显示了 AwsEventsEndpoint 对象的 AWS 安全调查发现格式 (ASFF)。要查看 AwsEventsEndpoint 属性的描述,请参阅 AWS Security Hub CSPM API 参考中的 AwsEventsEndpointDetails

示例

"AwsEventsEndpoint": { "Arn": "arn:aws:events:us-east-1:123456789012:endpoint/my-endpoint", "Description": "This is a sample endpoint.", "EndpointId": "04k1exajoy.veo", "EndpointUrl": "https://04k1exajoy.veo.endpoint.events.amazonaws.com", "EventBuses": [ { "EventBusArn": "arn:aws:events:us-east-1:123456789012:event-bus/default" }, { "EventBusArn": "arn:aws:events:us-east-2:123456789012:event-bus/default" } ], "Name": "my-endpoint", "ReplicationConfig": { "State": "ENABLED" }, "RoleArn": "arn:aws:iam::123456789012:role/service-role/Amazon_EventBridge_Invoke_Event_Bus_1258925394", "RoutingConfig": { "FailoverConfig": { "Primary": { "HealthCheck": "arn:aws:route53:::healthcheck/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111" }, "Secondary": { "Route": "us-east-2" } } }, "State": "ACTIVE" }

AwsEventsEventbus

AwsEventsEventbus 对象提供有关 Amazon EventBridge 全局端点的信息。端点可以通过使其具有区域容错能力来提高应用程序的可用性。

以下示例显示了 AwsEventsEventbus 对象的 AWS 安全调查发现格式 (ASFF)。要查看 AwsEventsEventbus 属性的描述,请参阅 AWS Security Hub CSPM API 参考中的 AwsEventsEventbusDetails

示例

"AwsEventsEventbus": "Arn": "arn:aws:events:us-east-1:123456789012:event-bus/my-event-bus", "Name": "my-event-bus", "Policy": "{\"Version\":\"2012-10-17\", \"Statement\":[{\"Sid\":\"AllowAllAccountsFromOrganizationToPutEvents\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Action\":\"events:PutEvents\",\"Resource\":\"arn:aws:events:us-east-1:123456789012:event-bus/my-event-bus\",\"Condition\":{\"StringEquals\":{\"aws:PrincipalOrgID\":\"o-ki7yjtkjv5\"}}},{\"Sid\":\"AllowAccountToManageRulesTheyCreated\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::123456789012:root\"},\"Action\":[\"events:PutRule\",\"events:PutTargets\",\"events:DeleteRule\",\"events:RemoveTargets\",\"events:DisableRule\",\"events:EnableRule\",\"events:TagResource\",\"events:UntagResource\",\"events:DescribeRule\",\"events:ListTargetsByRule\",\"events:ListTagsForResource\"],\"Resource\":\"arn:aws:events:us-east-1:123456789012:rule/my-event-bus\",\"Condition\":{\"StringEqualsIfExists\":{\"events:creatorAccount\":\"123456789012\"}}}]}"